Archives: SeCube funkciók

Inventory

Inventory: The resources recorded in the SeCube configuration database can be grouped in a hierarchical order, with relations specified, and the company’s operating model can also be defined. The database, among others, also enables the company’s organizational structure, site structure, technological and human resources, systems, services, data asset description, data processing activities, and business processes to be recorded, together with the visualization of their interrelations and connections and the modelling of their operational interdependability.

Tovább olvasom

Governance

Governance:Besides the analysis and planning functions, the software is explicitly aimed at the permanent supervision and maintenance of the security management system. Continuous validation monitoring functions support the provision of up-to-date results and advanced task management functions are used to support the tracking of responsibilities and tasks. The module also includes a BIA (Business Impact Analysis) function.

Tovább olvasom

Risk

Risk management: The risk analysis connects the vulnerabilities and protective measures of the data assets with the threats. If they were to occur, cause and effect simulations are available to analyze the consequences and any resulting business damages. The different types (CIA information security, human, physical, business, operation, ad hoc, project-based) of risk analyses in a number of different areas can be run concurrently, the results of which can be managed in a uniform approach in the interest of implementing and supporting integrated comprehensive enterprise risk management (ERM). Risk management and reporting functions support the continuous maintenance, supervision and management of the company’s risk-proportionate protection.

Tovább olvasom

Compliance

Compliance & Audit: Regular compliance tests and audits can be carried out as per the various pre-defined international standards, security recommendations and legislation. At the same time, even audit/requirement notes can also be compiled (e.g. security regulations, parent company requirements, internal audit requirements). The different compliance/audit analyses can even be used concurrently, and deficiencies can be managed with the use of integrated action plans with the possibility to generate detailed or even time machine reports.

Tovább olvasom

BCM

Business continuity and IT recovery management: The BCM module is capable of handling both business continuity and technological recovery planning in a unified manner along the lines of shared restore target times (RTO, MTPD, RPO). Business continuity planning (BCP) can be used to provide replacement or workaround solutions to avoid the downtime of resources that support business process (either technological, human, or facility-related). Detailed recovery and bridge plans can be carried out for technological resources, systems, and services in the course of disaster recovery (DRP) and service continuity management (SCM) planning. A flexibly developable scenario and planning system supported with draft board-like functions can be created, which is continuously kept up to date using change management, review, and testing functions, and detailed plans that can be exported in Word format and a test report. The tasks of the preparatory period (review, testing, saving, etc.) become part of the management system. In case of an emergency, simulation tests help in the correct application of the plans.

Tovább olvasom
top